麦田学社 下载中心 ISO_IEC 9798-5-2004 信息技术.安全技术.实体鉴别.第5部分_用零知识技术的机制.pdf

版块导航

热门下载

麦田学社 © my678.cn

ISO_IEC 9798-5-2004 信息技术.安全技术.实体鉴别.第5部分_用零知识技术的机制.pdf

 

ISO/IEC 9798-5-2004 信息技术.安全技术.实体鉴别.第5部分:用零知识技术的机制:
标准号:ISO/IEC 9798-5-2004
实施状态:作废
中文名称:信息技术.安全技术.实体鉴别.第5部分:用零知识技术的机制
英文名称:Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
发布日期:2004-12
被替代标准:ISO/IEC 9798-5-2009
代替标准:ISO/IEC 9798-5-1999;ISO/IEC FDIS 9798-5-2004
采用标准:ANSI/INCITS/ISO/IEC 9798-5-2004,IDT;CAN/CSA-ISO/IEC 9798-5-05-2005,IDT
起草单位:ISO/IEC JTC 1/SC 27
标准简介:This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques.
 Clause 5 specifies mechanisms (already present in the first edition, ISO/IEC 9798-4:1999) based on
identities and providing unilateral authentication. They have been repaired after the withdrawal of
ISO/IEC 9796:1991.
 Clause 6 specifies mechanisms (inserted in this second edition) based on integer factorization and
providing unilateral authentication.
 Clauses 7 and 8 specify mechanisms based on discrete logarithms with respect to numbers that are
either prime (see Clause 7, mechanisms already present in the first edition) or composite (see Clause 8,
mechanisms inserted in the second edition), and providing unilateral authentication.
 Clause 9 specifies mechanisms based on asymmetric encipherment systems and providing either
unilateral (see 9.3, mechanisms already present in the first edition), or mutual (see 9.4, mechanisms
inserted in the second edition) authentication.
The verifier associates the correct verification key with the claimant by any appropriate procedure, for
example, by retrieving it from a certificate. Such procedures are outside the scope of this part of
ISO/IEC 9798.
To identify each mechanism, Annex A specifies object identifiers in accordance with ISO/IEC 8825-1.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they will not be
zero-knowledge according to the strict definition sketched in Annex B for every choice of parameters.
Annex C compares the mechanisms and provides guidance on parameter choices.
Annex D provides numerical examples.
文件格式:PDF
文件大小:494.01KB
文件页数:58
(以上信息更新时间为:2019-11-22)



文档语言及版本参照下方封面截图:
ISO/IEC 9798-5-2004 信息技术.安全技术.实体鉴别.第5部分:用零知识技术的机制
点击下方链接查看更多内容。